SAD chapters online A 1-6 excluding five and online B
What is the term that is used to describe all the activities to build launch, and maintain an information system?
SDLC
In a workflow diagram, the arrows that cross the center line are used to identify what?
Screens and Reports
Online A
Starts here
SDLC stands for what?
Systems Development Life Cycle
The most important step in preparing for an interview is to ___
Establish an objective
The user goal technique normally begins by indentifying, listing, and classifying ___.
The system users.
The text identifies three primary areas of skills that are required of a systems analyst. Which of the following is NOT one of the three?
Writing skills
Every system boundary has a ___ between itself and the environment.
boundary
A one sentence description of a use case is called
brief use case description
To design the database schema, information from which diagram is the most important?
class diagram
Inheritance describes a condition between classes where ___.
classes share some attributes
Questions that have a simple definitive answer are called ___ questions.
close-ended
Questions that have a simple, definitive answer are called ___ questions
closed-ended
A type of information system that allows geographically distributed personnel to work together on projects and tasks is called a ___.
collaboration support system
A type of relationship between classes where the objects in one class are a part of the objects in another class AND they can only exist as part of the totality.
comoposition
A UML class that is allowed to ahve a set of actual objects within it is called a(n)
concrete class
In small development projects, a(n) ____ may be a small loose-leaf notebook or word processing file.
data dictionary
A(n) ___ can be a physical system model, a logical system mode, or a blend of the two.
data flow diagram
Analysts sometimes can spot black holes and miracles simply by examining the
data flow diagram
A place where data area held pending future access by one or more processes in a DFD is called a(n)
data store
On a DFD a(n) ___ represents a file or part of database that stores information about a data entity
data store
A centrally managed collection of data that is accessible to many users and systems at the same time is called a(n)
database
One way to show multiple, independent alternative paths within an activity diagram is with a
decision diamond
A(n) ___ is a tabular representation of processing logic containing decision variables, decision variable value, and actions or formulas
decision table
___ can summarize decision logic more concisely than structured English
decision tables
A(n) ____ is a graphical description of process logic that uses lines organized like branches of a tree
decision tree
Systems ___ mean specifying in detail how the many components of the information should be physically implemented.
design
A diagram that shows the method signatures in each class is called the
design class diagram
The purpose of a class diagram is to ___
document the information requirements in the new system
Two benefits of researching vendor solutions include ___ and ____
helping analysts discover state of the art solutions Helping users generate new ideas for business functions
Since a systems developer often words on systems that contain confidential corporate information, it is important that he or she have a high commitment to ___ and ethics
integrity
The most important and first step in preparing for an interview with a user is to establish the ___ of the interview
objective
The ___ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions
perfect technology assumption
The ___ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions
perfect technology assumption
The P in the FURPS acronyms stands for
performance requirements
For real-world objects the state of an object is the same as its ___
status condition
In UML notation, the guillemets character is used to show what kind of notation?
stereotypes
A business intelligence system supports
strategic planning and executive decision making
A system that is part of a larger system is called a
subsystem
Those skills which have to do with computers, programming, networks, and databases are called ___ skills.
technical
The group that provides direction for the configuration of the new system in the existing computing environment are called ___
technical stakeholders
An event that occurs simply by reaching a point in time is called a(n)
temporal event
Which is NOT an objective of integrity controls?
Ensure a stable functioning operating environment
What are two key elements of describing the environment?
External systems and technology architecture
One important reason for prioritizing requirements is to
avoid scope creep
An approach to dividing a system into components based on subsystems is referred to as
functional decomposition
Clients play what role in the development of a new system?
fund the project
Determine the major subsystems and assigning them to an iteration is done in which Core process?
2
Determining team members and assigning responsibilities is done in which Core process?
2
Performing in-depth fact finding and understand details is done as part of which Core Process?
3
Designing the database schema is included in which Core Process
4
Programming is included in which Core Process?
5
Overall functional testing is included in which Core Process?
6
What is usually the end result of an iteration
A piece of working code
An example of an attribute of an object might be ___
A social security number
A diagram that is most effective in describing the internal steps of a use case is
A workflow diagram
Which of the following is NOT considered a design model?
Activity diagram
Which of the following is a table that describes the relationship between processes and the location in which they are performed?
Activity location matrix
"Customer decides to buy shirt" is an example of what?
Activity prior to an event
A relationship between a "sports team" and the players, coaches, and sponsor would be described as what kind of relationship
Aggregation
___ is the term used to describe an information system development methodology that emphasizes flexibility and rapid response to anticipate new requirements during developement.
Agile developement
A work sequence draft provides three benefits to a project. Which of the following are included in those benefits?
Anticipate resource needs Measure progress
___ is the equivalence of data content between data flows entering and leaving a process and data flows entering and leaving a process decomposition data flow Diagram(DFD)
Balancing
The action-expression occurs when
Before the object enters the destination state
____ is an important part of the follow-up after an interview.
Building models
What are the three parts of a System Vision Document?
Business benefits Problem description System capabilities
Understanding the way an organization performs tis procedures is what kind of skill area?
Business skills
What do we call a person or group who provides funding for the development of the new system?
Client
The term "I'll know it when I see it" refers to what method of requirements definition?
Collecting active user comments
What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?
Completeness control
A(n) ___ represents the system response to one event
DFD fragment
What is the name of the general control technique used to ensure that entered data is correct?
Data validation control
Which of the following data flow diagram (DFD) symbols usually corresponds to a data entity on an entity-relationship diagram (ERD)?
Data-store
The domain model is always used as an input to which design activity?
Database Design
Which of the following is NOT a technique to document program logic for a process
Decision matrix
The design activity key question, "How will this system interact with other systems..." is part of which design activity?
Describe the environment
Method signatures are included in which diagram?
Design class diagram
The + in FURPS+ includes which of the following types of requirements
Design constraints Supportability requirements
A storyboard is useful for what?
Design of the user interface
Build or buy questions are usually addressed during which design activity?
Design the application components
Which two answers identify the two middle core processes i.e. core processes 3 and 4?
Design the components Understand the details of the problem
Which of the following is not one of the design activities included in the Design System Components core process?
Design the security controls
A knowledge of all the computing devices accessed by clients is required for which design activity?
Designing the user interface
Which two of the following are activities of Core process 3?
Develop user-interface dialogs Gather detailed information
User stories are different than use cases in what way?
Differ in the amount of detail captured
A process in which an organization commits to using an integrated set of software packages for key information systems is called ___.
Enterprise Resource Planning (ERP)
Two primary techniques to identify use cases are ___ and ___
Event decomposition techinique User goal technique
The technique used to identify used cases based on external, temporal, and state events is the
Event decomposition technique
In using the event decomposition techniqure, which of the following is NOT a type of event that is considered.
Event initiated by a user login
What type of stakeholders are those that do not use the system on day to day tasks but use information, such as reports, from the system.
Executive stakeholders
Which of the following is NOT a step in the development of a state machine diagram?
Expand the name of each state to identify concurrent activites
A(n) ___ is a person or organization outside the system boudnary that supplied data inputs or accepts data outputs
External agent
___ requirements are based on the procedures and rules that the organization uses to run its business
Functional
___ refers to the division of a system into processes or subsystems.
Functional Decomposition
Which of the following describes what the system is required to do?
Functional requirements
An arrow leading from three object sets to another indicates what type of association?
Generalization specialization
___ is based on the idea that people classify things in terms of similarities and differences.
Generalization specialization
The purpose of a use case is to ___
Identify a business event that requires system action
Two important goals or steps within Core Process one are ___ and ___
Identify the solution objective; obtain project approval
A ___ includes hardware, software, inputs, outputs, data, people, and procedures.
Information system
Which of the following is normally the most time-consuming and resource expensive operation?
Interview stakeholders
Which of the following is an example of a state event?
Inventory reorder point is reached
When analyzing the list of nouns to determine whether to exclude a particular noun as an important "thing," which of the following should be asked about the noun?
Is it a synonym of an existing thing? Is it an output from the system?
The way to determine whether an occurrence is an event or part of the interaction before or after the event is to ask the following question
Is the system at rest
Which of the following is NOT true about a UML class
It has mutliplicity
Which of the following refers to a modeling technique that breaks the system into a hierarchial set of increasingly more detailed models?
Level of abstraction
The rule of 7 ± 2 is also known as
Miller's number
A(n) Answer is a process or data store with a data element that is created out of nothing.
Miracle
Which of the following is an example of a temporal event?
Month end billing is started
___ is used to describe the actual range of linkups allowed in an association (the minimum and maximum values)
Multiplicity constraints
___ requirements are characteristics of the system other than the business procedures it must support.
Nonfunctional
What are the two primary benefits of reviewing the documentation of existing inputs, outputs, and procedures.
Obtain a preliminary understanding Serve as visual aids in interview discussions
The P in FURPS acronyms stands for ___
Performance
___ requirements describe operational characteristics related to measures of workload such a throughput and response time
Performance
Which of the following is NOT a defined area of knowledge that is required of systems analysts?
Problem Solving Knowledge
Which of the following statements is correct about questionnaires?
Questionnaires have a limited and specific use in information gathering
Which of the following data flow diagram (DFD) symbols represents the communication between an external agent and a process while the process is executing?
Real-time link
Which user is known to the system and is authorized to access all or certain parts of it?
Registered user
The R in the FURPS acronyms stands for
Reliability
___ requirements describe the dependability of a system such as a service outages and incorrect processing
Reliability
___ requirements describe how access to the software application will be controlled and data will be protected
Security
The S in the FURPS acronyms stands for
Security Requirements
Limiting user access to the system is considered what type of design activity?
Security and controls design
When making a list of nouns to determine what are the important "things" for the new system, there are three question that should be asked about each noun. Which of the following is one of those questions?
Should it be researched further?
A diagram that shows the overall structure of a system as it exists after it is deployed is called what?
Software components diagram
____ is a method of writing process specification that combines structure programming techniques with narrative English.
Structured English
The term "___" refers to a business professional who uses analysis and design techniques to solve business problems using information technology.
Systems analyst
Application architecture is used to refer to
The organization and configuration of all software solutions into information systems
The primary difference between a work breakdown structure and a work sequence draft is that the work sequence draft shows ___
The sequence of tasks
What is the purpose of an iteration recap?
To review the project processes
___ is used to describe the relationship between two things of the same type, such as one person being married to another person
Unary association
What does the acronym UML stand for?
Unified Modeling Language
Use case diagrams, class diagrams, sequence diagrams are all examples of what standard modeling method?
Unified Modeling Language (UML)
The U in the FURPS acronym stands for
Usability
__ requirements describe operational characteristics related to users such as work procedures and online help
Usability
What are the first two models, e.g. diagrams that include the entire system, that are built during the Core Process to discover and understand the details
Use case diagram Class Diagram
What do we call the type of testing that the users preform to ensure that the system meets the business requirements?
User acceptance testing
Which of the following is NOT considered an analysis model?
User interface screen layouts
Which of the following is the analyst's approach to problem solving?
Verify that the benefits of solving the problem outweigh the costs, then define the requirements for solving the problem
Which of the following is NOT a part of the application architecture?
Virtual private networks
Which are the major business themes that guide analysts in fact finding activities?
What are the business processes? Ho are the business processes performed? What information is needed?
The guard-condition on a transition indicates what?
Whether the transition fires.
The UML notation for the "includes" relationship is a(n)
a dashed arrow
A UML class that never has any objects within the class is called an
abstract
In a generaliztion/specialization relationship, it would not make sense for a class at the bottom of the hierarchy to be a(n) ___ class
abstract
Features of a particular user story that must be present in the final document are called
acceptance criteria
The final part of a user story is the ___, which indicates the features that must be present
acceptance criteria
A(n) Answer control restricts which persons or programs can add, modify or view information.
access
A(n) Answer is the list of users who have rights to access the system and data.
access control list
In a transition label in a state machine A(B)[C]/D. The D stand for what?
action expression
Another name for a workflow diagram is a ___ diagram
activity
An ___ describes the sequential flow of user activities
activity diagram
Workflows can be documented using _______.
activity diagrams
A(n) ___ is a table that describes stored data entities, the locations from which they are accessed, and the nature of the accesses.
activity-data matrix
An external agent or person that interacts with the system by supplying data is called a(n)
actor
A type of relationship where between classes where the objects in one class are part of the objects in another class BUT they can also exist as separate objects alone.
aggregation
An information system development process that emphasizes flexibility to embrace change is called
agile development
In UML the constraint denoted by "0..*" indicates what?
an optional relationship
Core process 3 is called "Discover and understand details." another term that is used to describe these activities is ___ activities
analysis
The process of understanding and specifying in detail what the information system should accomplish is called systems
analysis
A major comparison between analsys and design can be stated as:
analysis is understanding, design is solution
Another term that is used to define a computer application is
app
A well-defined unit of software built to perform some specific tasks is called a(n) Answer.
application component
Questionnaires can be useful in information gathering when users ___
are widely distributed geographically
A class that represents a many-to-many association between two other classes is called a(n) ___ class.
association
A term in UML that describes a naturally occurring relationship between specific things is called a(n)
association
An association that is also treated as a class is called an
association class
A descriptive piece of information about a thing or object is called an ____
attribute
A piece of information about a particular object is called a
attribute
Descriptive properties of things in the problem domain are often documents as what?
attributes
is the process of identifying a user to verify that he or she can have access to the system.
authentication
is the process of allowing or restricting a specific user's access to specific resources.
authorization
An automation boundary is best described as the separation between the ____.
automated part of a system and the manual part of the system
The ___ describes the seperation between the automated part of a system and the manual part of a system
automation
The ___ is the dividing line between the computerized portion of the system and the users who operate the system.
automation
The boundary between the automated portion of th esystem and the users of the system is called the
automation boundary
The term "Answer" is used to describe the equivalence of data content between data flows entering and leaving a process and data flows entering and leaving a process decomposition data flow diagram (DFD).
balancing
Chapter 1
begins here
A process or data store with data input that is never used to produce a data output is referred to as a(n)
black hole
A technique to identify problem domain objects in which developers and users work together in an open group setting is called the
brainstorming technique
One technique to find the "things" that need to be included in the new system begins by starting with a user and the use cases and then try to identify the necessary informational "things." This technique is called that ___.
brainstorming technique
The event decomposition techniques begins by identifying all of the ___
business events
When words are concatenated together to form a single word and the first letter of each is capitalized it is called a ___ notation
camelback
A measure of the number of links between one objects and another object in a relationship is called the
cardinality
The crows feet notation on an ERD is a type of ___ constraint
cardinality
The number of associations that occur among specific things in an entity relationship diagram is called ___
cardinality
Support systems that allow employees to communicate with each other and with customers and suppliers are called
collaboration support systems (CSS)
If we modeled a "sale" and the "sale items" with a whole-part relationship, it would be best described as a ___ relationship
composite
An attribute that contains a collection of related attributes is called a(n)
compound attribute
In a state machine diagram when an object is in multiple states at the same time it is called
concurrency
A(n) ___ is a data flow diagram that summarizes all processing activity within the system in a single process symbol.
context diagram
A(n) ____ is a data flow diagram (DFD) that summarizes all processing activity within the system in a single process symbol.
context diagram
The two systems that are externally orient, i.e. they focus on entities outside the organization.
customer relationship and supply chain management systems
In the traditional approach to system development, the system stores information about
data entities
A ___ is a textual description of a data flow's content and internal strucutre.
data flow definition
A diagram that represents system requirements as processes, external agents, data flows, and data stores is called a(n)
data flow diagram
When an object moves from one state to another the ending state is called a(n)
destination state
Questionnaires can be used to ask questions that
determine user opinions
The encoding of a message with a private key is called
digital signing
A(n) ____ is a task that is performed by one person in response to a business event, adds value, and leaves the system in a stable condition.
elementary
The level of analysis to use when identifying user goals is ___
elementary business process level
Highly integrated systems that support company-wide operations and data, often combining aspects of many other systems is a
enterprise resource planning application
The diagram consisting of data entities and their relationships is called a(n)
entity relationship
A(n) ___ is somethin that occurs at a specific time and place and can be precisely measured.
event
An occurrence at a specific time and place, which can be descirbed and is worth remembering, is called a(n)
event
Somethin that occurs at a specific time and place and should be remembered by the system is called a(n)
event
The ___ technique is a technique to identify use cases by determining the external business events to which the system must respond.
event decomposition
The term diagram 0 is another name for a(n) ____.
event-partition system model
A data flow diagram (DFD) that models system requirements using a single process for each event in a system or subsystem is called a(n)
event-partitioned system model
A data flow diagram (DFD) that models system requirements using a single process for each event in a system or subsystem is called a(n) ___.
event-partitioned system model
Persons outside an organizations control who interact with the system or who have an interest in its operation are called ___ stakeholders
external
An event that occurs outside the system is called a(n)
external event
The type of event that occurs outside of the system is called a(n) ___.
external event
___ is an important part of each interview
follow up
A DFD ___ represents the system response to one event within a single process symbol
fragment
A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the Answer.
fraud triangle
___ requirements are most often documents in graphical and textual models
functional
In a relationship where there are superclasses and subclasses, the relationship is called a relationship
generalization/specialization
Diagrams and schematic representations of some aspect of a system are examples of a ___ model
graphical model
Two of the primary benefits of iterative development include
high risk elements done first early deployment of part of the system
A system that is subject to many external laws and regulations is a
human resource management system
___ requirements describe the constraints such as programming languages, tools, and communications protocols for distributed portions of the system.
implementation
A relationship between use cases in which one use case is used by another used case is called the
includes relationship
An analyst can avoid information overload by adhering to the rule of ___
information minimization
If too much information is presented at once, people experience a phenomenon called
information overload
A collection of interrelated components that collect, process, store, and provide as output the information needed to complete a business task is called a _______.
information system
A concept that allows subclasses to share characteristics of their superclasses is called
inheritance
The idea that the attributes of a superclass are also attributes of a subclass is called
inheritance
A(n) Answer control is a control that rejects invalid inputs, prevent unauthorized outputs, and protects data and programs against tampering.
integrity
___ requirements describe interactions between systems, e.g. the method of communication between one system and another system
interface
Persons within an organization who have a significant interest in its operation are ___ stakeholders
internal
Another name for a state event is a(n)
internal event
State events are also sometimes called ___ events.
internal events
In UML notation the includes relationship connects two use cses. The use case that is "included" use case is the one which ___
is connected to the head of an arrow
Asking many detailed, probing questions during an initial interview usually
is necessary to understand the business process
A development process where the system is grown piece by piece is called
iterative development
An attribute for an object which can be used to uniquely identify that object is called a(n)
key
An attribute whose value uniquely identifies an object is called a(n)
key attribute
The strength of closed-ended questions is that they
limit answers to a set of choices
Two of the primary elements that are included in a work breakdown structure include:
list of tasks and estimated effort
Which of the following is a diagram or map that identifies all of the processing location of a system
location diagram
A relationship that has a cardinality constraint of one or more is a(n) ___ relationship
mandatory
As association class is frequently required for what kind of relationship?
many to many
A series of formulas that describe technical aspects of a system is a(n) model.
mathematical model
One of the dangers in researching vendor solutions is that users and analysts
may want to buy one of these solutions prematurely
is a principle of model design that seeks simplicity by limiting the number of connections among model components.
minimization of interfaces
A representation of some aspect of the system being built is a ___
model
A synonym for cardinality (used with UML class diagrams) is ___.
multiplicity
In UML notation for object oriented approach the term ___ is used instead of cardinality
multiplicity
One technique for finding "things" that need to be in the new system is done by the analyst starts making lists of "things." He may do this from information and even without talking to the users extensively. This technique is called that ___
noun technique
The technique for finding problem domain objects by finding and listing all the nouns in a dialog or description is called a
noun technique
A state machine diagram is used to document the state and transitions of a
object
The above cardinality constraint on the order data entity indicates that there can be
one or many orders
Questions that encourage discussion are called ___ questions
open-ended
Persons who regularly interact with the system as part of their jobs are called ___
operational stakeholders
In a state machine diagram, a state is represented by a(n)
oval
What is the name of the diagram that is often used to show the different layers of the system?
package diagram
A sequential set of connected states and transitions is called a(n)
path
An assumption about DFDs that includes things such as instant processing, infinition storage, and zero errors is called
perfect technology
If the DFD is a ___, then it assumes that the system will be implemented with perfect technology.
physical model
Every successful inter requires ___
preparation
When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key.
private
A user who has special security and access to a system, such as the right to assign passwords, is called a ____.
privileged user
The specific area of the user's business need that is within the scope of the new system is called the
problem domain
The specific area of the user's business need that is within the scope of the new system is called the ___
problem domain
The most important role of a systems analyst in business is __
problem solving
A symbol on a data flow diagram (DFD) that represents an algorithm or procedure by which data inputs are transformed into data outputs is called a(n)
process
A symbol on a data flow diagram (DFD) that represents an algorithm or procedure by which data inputs are transformed into data outputs is called a(n) ____.
process
The traditional approach to information systems development describes activities as
processes carried out by people or computers
What is the single activity that usually requires the most time during a project?
programming
A planned undertaking that has a beginning and an end and produces some result is called a
project
The beginning state of an object when its staes are diagrammed is called a(n)
pseudostate
As part of the interview process, any unresolved issues should be ____
put on an open-items list
The source of using the concept of events to define functional requirements was first emphasized with ___ systems.
real-time
A(n) ___ is a naturally occurring association among specific things.
relationship
The standard template for a user sotry is "As a ____ I want a goal so that reason." Fill in the blank
role
A control that protects the assets of an organization against all threats, primarily external threats is called Answer control.
security
A drawing which shows individual objects and their links with other objects, and which is used to help understand the problem domain class is called a(n)
semantic net
The boxes on a class diagram can be though of as a particular
set of objects
The domain model class diagram is used to ___
show the things involved in the user's work that are important
An information system consists of
software, database, and manual processes
Persons who have an interest in the successful implementtion of the new system are called ___
stakeholders
The term ___ refers to all the people who have an interest in the successful implementation of the system
stakeholders
A condition during an objects life when it satisfies some criterion is called a(n)
state
A(n) ___ event occurs when something happens inside the system that triggers the need for processing
state
An event that occurs when something inside the system triggers the need for processing, but usually as a consequence of external activity is called a ___ event.
state
A UML diagram that shows the life of an object in states and transitions is called a(n)
state machine diagram
When a system is partition into pieces, each piece is referred to as a
subsystem
After investing resources in thoroughly understanding the business problem, the analyst decides that the costs of solving the problem will likely outweigh the benefits. The analyst should ____.
suggest that the project should be discontinued.
A knowledge management system
supports the storage of an access to documents within an organization
In Answer encryption, the same key encrypts and decrypts the data.
symmetric
One way to show concurrent paths within an activity diagram is with a
synchronization bar
The symbol that is used to initiate concurrent paths in a state machine diagram is what?
synchronization bar
Looping in an activity diagram is best represented using what?
synchronization bars
A ___ is a collection of interrelated components that function together to achieve some outcome.
system
The process of understanding and specifying what the information system should accomplish is called
system analysis
Checks and safety procedures taht are put in place to protect the integrity of the system are called
system controls
Checks or safety procedures are put in place to protect the integrity of the system is referred to as
system controls
The primary output of Core process one and which is used to get project approval is called
system vision document
Those activities that enable a person to understand and specify what the new system should accomplish are usually referred to as
systems analysis
Those skills, steps, guides, and tools that support and lead up to the actual programming of the system are referred to as
systems analysis and design
A business professional who uses analysis and design techniques to solve business problems using technology is called a
systems analysts
A person that functions as an architect to plan, capture the vision, and understand the needs for new system is often called a ___
systems analysts
The process of specifying how components of the new system should be implemented is called
systems design
Those activities that enable a person to describe in detail how the information systems will actually be implemented are called
systems design
Those activities that enable a person to describe in the detail the system that solves the need is called ___
systems design
Such things as how to do project planning, or how to do cost/benefit analysis, or how to conduct an interview is called _______.
techniques
The term technology architecture refers to
the hardware, network, and system software
During a fact finding interview, and important guideline is ___.
to probe to get sufficient details
A specific software application that assists developers in creating models or other components required for a project is called a
tool
The movement of an object from one state to another is done through the process of a(n)
transition
Which of the following is NOT an element in a transition label?
trigger
The association shown on the above image is a(n) ___ association.
unary
An application component can be thought of as a(n) __________.
unit of software
___ requirements describe how a system is configured, monitored, maintained, and updated
usability
An activity that the system performs in response to a user request is called a
use case
Detailed design is the thought process of how to program each ___
use case
The system's reaction to an event is called a(n) ___
use case
The diagram that illustrates actors and their relationships to the functions provided by the system is called a
use case diagram
One common element of all types of business information systems is that they all
use database technology
A UML model that is used to show use cases and their relationships to actors is called a(n)
user case diagram
One technique to identify use cases is to ask users what they want to achieve with a particular business procedure. This technique is called the ___ technique.
user goal
The ___ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user.
user goal
Acceptance criteria are usually associated with
user stories
"As a student, I want to register for a class in order to fulfill education requirements" is an example of a(n) ___
user story
A short sentence used by an end user that states what he/she does as a part of his/her work is called a
user story
A control that checks the value of a field to ensure that it is within the correct range is a(n) Answer control.
value limit
The general relationship between classes in which one class is a part or component of another class is called a(n) ___ relationship
whole-part
A document that identifies and lists all of the tasks to be completed within an iteration is called a
work breakdown structure (WBS)
A ___ is the sequence of processing steps that completely handles one business transaction.
workflow
Minimization of interfaces is directly related to the rule of ___.
7 ± 2
Which of the following is NOT a factor that affects the risk of fraud?
Authorization of users
A primary model used in software design is which of the following?
Design class diagram
Software methods are usually identified in which design model?
Design class diagram
The design activity key question, "What internal structure for each application component will ensure efficient construction..." is part of which design activity?
Design the software classes
A deployment diagram is most useful for which design activity?
Designing application components
When describing the interfaces to external systems, which is not one of the important issues?
Programming languages
Which design activity that pervades all other design activities?
Security and controls design
Which of the following can be classified as privileged users?
System programmers, application programmers, and system administrators
Which of the following is a type of model used in user interface design?
System sequence diagram
Which of the following really is both an analysis (discovery) and a design process (solution).
User interface design
What is a control that checks the value of a field to ensure that it is within the correct range?
Value limit control
The objective of Implementation is to
build a new system
Which is not a model normally produced as part of application component design?
design class diagram
A ____ is an institution's name and public key, which is encrypted and certified by a third party.
digital certificate
An integrity control that verifies the data in one field against the data in other fields is called a ____ control.
field combination
Three types of users that are considered in the design of a security system are ____.
unauthorized user, registered user, and privileged user
Using digital signatures is primarily a technique to ____.
verifying who sent a document